Analysis

  • max time kernel
    22s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/12/2024, 20:59

General

  • Target

    40a476c2bcbad8d8f2ccd4e37c0cf854cb2df1ae0dbc7dae1c7b2a12eeb4ad92N.exe

  • Size

    292KB

  • MD5

    eab583259bde4b70b251e103bd7ac490

  • SHA1

    15d86e4289881fbcc6cebaba6bb88f80867d1870

  • SHA256

    40a476c2bcbad8d8f2ccd4e37c0cf854cb2df1ae0dbc7dae1c7b2a12eeb4ad92

  • SHA512

    7cde0823ae4697c95b611c6ed21ff8a7ed0d70bf9ed46878f2487c3c78b47eb3f42a1c01055ebb31f9d631c5211a12ba5c39f093e8ce1fc5164a4ee6b161841d

  • SSDEEP

    6144:/vEF2U+T6i5LirrllHy4HUcMQY68AzQR5PSV1:nEFN+T5xYrllrU7QY68ZSH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 6 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1156
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1184
          • C:\Users\Admin\AppData\Local\Temp\40a476c2bcbad8d8f2ccd4e37c0cf854cb2df1ae0dbc7dae1c7b2a12eeb4ad92N.exe
            "C:\Users\Admin\AppData\Local\Temp\40a476c2bcbad8d8f2ccd4e37c0cf854cb2df1ae0dbc7dae1c7b2a12eeb4ad92N.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2260
            • \??\c:\windows\system\explorer.exe
              c:\windows\system\explorer.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies firewall policy service
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Windows security bypass
              • Boot or Logon Autostart Execution: Active Setup
              • Deletes itself
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2756
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2572
                • \??\c:\windows\system\svchost.exe
                  c:\windows\system\svchost.exe
                  5⤵
                  • Modifies WinLogon for persistence
                  • Modifies visiblity of hidden/system files in Explorer
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2228
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe PR
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1052
                  • C:\Windows\SysWOW64\at.exe
                    at 21:01 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1864
                  • C:\Windows\SysWOW64\at.exe
                    at 21:02 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    6⤵
                      PID:2912
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:2032

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\mrsys.exe

              Filesize

              292KB

              MD5

              6e94a31c57f6b3f828bb2b75db282f31

              SHA1

              573034c4553cc521627738805ed34a54d1f31957

              SHA256

              ca2224e434a0bbd1f94105e93007b3ba71d815f0223cc935dcce935fc876468b

              SHA512

              6418c95b39dc04ec0626bcca04d3e51437a1ad465e758956a0089a16a99db8ce3134c07575bd37b673f360344c477c64d40694b98c1a3e7744286eb93ffec033

            • C:\Windows\SYSTEM.INI

              Filesize

              257B

              MD5

              1bacd298e2fcafe9b2cde99a93ebb7cb

              SHA1

              b1ea2eea87f5753c3000263fbb799cfbbf07bd63

              SHA256

              7ae44247604da79b0a87ca646f44ad556ed3e954df20328e7c05e40ad68f7ed0

              SHA512

              28d43227ff584f227e4f0e9320dd2e81bfc3af3e1a0be176837cb614a68f2e7359a21ba8db7260a98cfd5c02185ed0f2e5ac5c3645097dcd93def8889bb6d661

            • C:\Windows\system\explorer.exe

              Filesize

              292KB

              MD5

              f78c256395b9968fbc1f076faf891692

              SHA1

              ca7f6f760b590b35795b7eec5585ea1ee63edc0b

              SHA256

              27e70e28fd3d06c55e82ace73ced304ac097e5b2a0e205fcd11bb4c0eea30c8e

              SHA512

              043359d18d0415db0ec00974eacc6b89b62d8c736033ff4fa4d89f9cf0165cf984f6b59ae3a5d83aed9cf1305af83238308cd024afd79e044caa29c75afed8d2

            • C:\Windows\system\svchost.exe

              Filesize

              292KB

              MD5

              1f0d1349430696ca8f25dc3a34536adf

              SHA1

              b44910aadb96804d66cc9908a01e4ff411a21223

              SHA256

              890423a2e3a929d5a1d64be4e8daf54b2616f4de03637ab3896c76f60b48e7d4

              SHA512

              00ad19e821c7e33b01fd7fd83bdf0b5a031f7648bdf542bc237590ecf36f028eb6f7fa8d171d4ebe792e2e07af3b4e02d3e68d90c99e3d4265941b86c11bc722

            • C:\skmcro.exe

              Filesize

              100KB

              MD5

              b3bb24e91ecf2d2494930df1dbd61ee6

              SHA1

              2c8ca9453e2a5db79a1435306a59d27f5343167d

              SHA256

              c817e77e0a075d068acc968fc284bd707468e8c41fecc1b8f5a8d7987799b99d

              SHA512

              f60003cb4c0cb7c2abca8b4694cd7fc6eab9fd46e477faf1ccf473514747fe93ea881a123a8701168d1d7d331f054e7ff05d9264d6c0598d2b9baa28137c5985

            • \Windows\system\spoolsv.exe

              Filesize

              292KB

              MD5

              281da393b8831f4d983717a0c27bace1

              SHA1

              afefef6c1148b6e931cb6acde5dc75ee1982eb11

              SHA256

              a62e1010ad6f707ee31c282e936ef05d22d630b62a65baa8be2143b1ad45b0cd

              SHA512

              311a8b2c5a39a526e7933fc4d00c562adca2ad841f82733a69b17c151e22afa25f5b6888946c8297c1cf89b9a183aacd5cf383084460626a960fe7c6fb319e69

            • memory/1052-72-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/1108-15-0x00000000020F0000-0x00000000020F2000-memory.dmp

              Filesize

              8KB

            • memory/2228-246-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2228-119-0x0000000002690000-0x0000000002691000-memory.dmp

              Filesize

              4KB

            • memory/2228-120-0x0000000001EE0000-0x0000000001EE2000-memory.dmp

              Filesize

              8KB

            • memory/2228-90-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2260-22-0x0000000004330000-0x0000000004332000-memory.dmp

              Filesize

              8KB

            • memory/2260-25-0x00000000048B0000-0x00000000048B1000-memory.dmp

              Filesize

              4KB

            • memory/2260-9-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-7-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-12-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-5-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-4-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-0-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2260-78-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-80-0x0000000004330000-0x0000000004332000-memory.dmp

              Filesize

              8KB

            • memory/2260-23-0x00000000048B0000-0x00000000048B1000-memory.dmp

              Filesize

              4KB

            • memory/2260-28-0x0000000004330000-0x0000000004332000-memory.dmp

              Filesize

              8KB

            • memory/2260-8-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-3-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-87-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2260-10-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2260-1-0x00000000026E0000-0x000000000376E000-memory.dmp

              Filesize

              16.6MB

            • memory/2572-73-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2756-92-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-88-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2756-99-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-123-0x0000000002690000-0x0000000002692000-memory.dmp

              Filesize

              8KB

            • memory/2756-98-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-97-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-95-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-94-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-113-0x00000000026A0000-0x00000000026A1000-memory.dmp

              Filesize

              4KB

            • memory/2756-121-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-122-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-125-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB

            • memory/2756-89-0x00000000024D0000-0x0000000002512000-memory.dmp

              Filesize

              264KB

            • memory/2756-96-0x0000000003450000-0x00000000044DE000-memory.dmp

              Filesize

              16.6MB